Research from enterprise mobility services company, MobileIron, has found that almost a third of its customers have at least one outdated mobile policy.

Download this free guide

3 expert insights into how mobile security is evolving for business

Download this e-guide to read expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management - indicating an evolution towards a unified approach to mobile security.

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

The Mobile Security and Risk Review study, based on security analytics collected from 7,800 MobileIron customers between 1 October and 31 December 2016, analysed mobile Android, iOS and Microsoft Windows use in enterprises.

According to MobileIron, this can occur if users have a device that they use infrequently or receive a new device and stop using their old device, resulting in scenarios where a device either connects infrequently or “fades away”, preventing it from receiving updates.

One of the areas where security has been improving is updating operating system (OS) software. The majority of regions and verticals saw an increase in the percentage of companies enforcing mobile OS updates.

Security-focused industries – such as financial services (12%), government (11%) and healthcare (12%) – are enforcing OS updates at a greater rate than the global average of 9%.

Companies in Belgium and the Netherlands (both at 14%) were the most likely to enforce OS updates, while Japanese companies (3%) were the least likely, MobileIron’s research found.

“For Android, disabling ‘allow untrusted sources’, as well as monitoring app permissions – such as blacklisting apps that request the device admin permission – will reduce risk of unauthorised changes to configurations and apps.”

However, its research found that while most organisations spent time creating policies, nearly half of the companies surveyed did not take an action such as blocking network access.

This may be because in many low-risk scenarios, the action taken is to alert the employee or IT administrator to request manual remediation, MobileIron noted. It recommended automating policy enforcement to protect against future mobile attacks.

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy